Behavioral task
behavioral1
Sample
ea4b669059899755ae9661c63f39505f62cf6e31509126bfa897fc24d35cd347.elf
Resource
debian9-armhf-20240418-en
debian-9-armhf
2 signatures
150 seconds
General
-
Target
31f1e73d6d69bd7048efc723ba68dc43.bin
-
Size
44KB
-
MD5
bfddab466b84bce1e092ecea28002f95
-
SHA1
45c8a89e0f0a6e3db260678b30700a336addc35a
-
SHA256
bb632c8c7802f3d7d63fed3023e7aeac02b20b18c4923f2c374384c092d67281
-
SHA512
02899f3bf84f0ad28e866e6d4d7084ffc45a46e985860f0dcfcbd954db4393993333b3473d4853c7058190205fa74a404e9c7e23312c4c8acb23c66bc1508732
-
SSDEEP
768:LB3pf3eiRHE6y9Mj0Hhr6KMKzcBD+wxyagHdziNFwys+nFrFy0SLvAck25:NBeiFEVMj0HhfMuk/sFiknurFyfL4cJ5
Score
10/10
Malware Config
Extracted
Family
gafgyt
C2
93.123.85.251:12345
Signatures
-
Detected Gafgyt variant 1 IoCs
resource yara_rule static1/unpack001/ea4b669059899755ae9661c63f39505f62cf6e31509126bfa897fc24d35cd347.elf family_gafgyt -
Gafgyt family
Files
-
31f1e73d6d69bd7048efc723ba68dc43.bin.zip
Password: infected
-
ea4b669059899755ae9661c63f39505f62cf6e31509126bfa897fc24d35cd347.elf.elf linux arm